Juniper Networks
Solutions
Products & Services
Company
Partners
Support
Education

Signature Detail

Security Intelligence Center
Signatures
Print

This site is deprecated. Please CLICK HERE for latest updates

Short Name

SMB:MAILSLOT-OF

Severity

Minor

Recommended

No

Category

SMB

Keywords

MAILSLOT Heap Overflow

Release Date

2006/07/11

Update Number

1213

Supported Platforms

idp-4.0+, isg-3.0+, j-series-9.5+, mx-11.4+, srx-12.1+, srx-branch-12.1+, vmx-17.4+, vsrx-12.1+, vsrx3bsd-18.2+

SMB: MAILSLOT Heap Overflow


This signature detects attempts to exploit a known vulnerability in the SMB protocol. A successful attack can lead to a buffer overflow and arbitrary remote code execution within the context of the system.

Extended Description

The server driver (srv.sys) in Microsoft Windows NT 4.0, 2000, XP, and Server 2003 allows remote attackers to cause a denial of service (system crash) via an SMB_COM_TRANSACTION SMB message that contains a string without null character termination, which leads to a NULL dereference in the ExecuteTransaction function, possibly related to an "SMB PIPE," aka the "Mailslot DOS" vulnerability. NOTE: the name "Mailslot DOS" was derived from incomplete initial research; the vulnerability is not associated with a mailslot.

Affected Products

  • Microsoft windows_2000 *
  • Microsoft windows_2003_server 64-bit
  • Microsoft windows_2003_server itanium
  • Microsoft windows_2003_server r2
  • Microsoft windows_2003_server sp1
  • Microsoft windows_xp *

References

  • BugTraq: 18863
  • CVE: CVE-2006-1314
  • CVE: CVE-2006-3942

Site Map
RSS Feeds
Careers
Accessibility
Feedback
Privacy Policy
Legal Notices
Copyright © 1999-2010 Juniper Networks, Inc. All rights reserved.
Help
|
My Account
|
Log Out